Sciweavers

1298 search results - page 7 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BMCBI
2007
156views more  BMCBI 2007»
14 years 9 months ago
Large-scale clustering of CAGE tag expression data
Background: Recent analyses have suggested that many genes possess multiple transcription start sites (TSSs) that are differentially utilized in different tissues and cell lines. ...
Kazuro Shimokawa, Yuko Okamura-Oho, Takio Kurita, ...
SDM
2009
SIAM
217views Data Mining» more  SDM 2009»
15 years 6 months ago
A Framework for Exploring Categorical Data.
In this paper, we present a framework for categorical data analysis which allows such data sets to be explored using a rich set of techniques that are only applicable to continuou...
Shyam Boriah, Varun Chandola, Vipin Kumar
ECML
2001
Springer
15 years 2 months ago
Iterative Double Clustering for Unsupervised and Semi-supervised Learning
We present a powerful meta-clustering technique called Iterative Double Clustering (IDC). The IDC method is a natural extension of the recent Double Clustering (DC) method of Slon...
Ran El-Yaniv, Oren Souroujon
SP
2007
IEEE
15 years 3 months ago
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing
In this paper, we present ShieldGen, a system for automatically generating a data patch or a vulnerability signature for an unknown vulnerability, given a zero-day attack instance...
Weidong Cui, Marcus Peinado, Helen J. Wang, Michae...
COMPSAC
2008
IEEE
15 years 4 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine